{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T03:25:43Z","timestamp":1773545143805,"version":"3.50.1"},"reference-count":74,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2023,1,28]],"date-time":"2023-01-28T00:00:00Z","timestamp":1674864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,1,28]],"date-time":"2023-01-28T00:00:00Z","timestamp":1674864000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Centre for Digital Ethics"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["AI &amp; Soc"],"published-print":{"date-parts":[[2024,8]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Today, open source intelligence (OSINT), i.e., information derived from publicly available sources, makes up between 80 and 90 percent of all intelligence activities carried out by Law Enforcement Agencies (LEAs) and intelligence services in the West. Developments in data mining, machine learning, visual forensics and, most importantly, the growing computing power available for commercial use, have enabled OSINT practitioners to speed up, and sometimes even automate, intelligence collection and analysis, obtaining more accurate results more quickly. As the infosphere expands to accommodate ever-increasing online presence, so does the pool of actionable OSINT. These developments raise important concerns in terms of governance, ethical, legal, and social implications (GELSI). New and crucial oversight concerns emerge alongside standard privacy concerns, as some of the more advanced data analysis tools require little to no supervision. This article offers a systematic review of the relevant literature. It analyzes 571 publications to assess the current state of the literature on the use of AI-powered OSINT (and the development of OSINT software) as it relates to the GELSI framework, highlighting potential gaps and suggesting new research directions.<\/jats:p>","DOI":"10.1007\/s00146-023-01628-x","type":"journal-article","created":{"date-parts":[[2023,1,28]],"date-time":"2023-01-28T04:01:52Z","timestamp":1674878512000},"page":"1827-1842","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["Open source intelligence and AI: a systematic review of the GELSI literature\ufeff"],"prefix":"10.1007","volume":"39","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8645-7401","authenticated-orcid":false,"given":"Riccardo","family":"Ghioni","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1181-649X","authenticated-orcid":false,"given":"Mariarosaria","family":"Taddeo","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5444-2280","authenticated-orcid":false,"given":"Luciano","family":"Floridi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,1,28]]},"reference":[{"key":"1628_CR1","doi-asserted-by":"crossref","unstructured":"Amardeilh F, Kraaij W, Spitters M, Versloot C and Yurtsever S (2013) Semi-automatic ontology maintenance in the virtuoso news monitoring system. In: 2013 European Intelligence and Security Informatics Conference, 135\u2013138. IEEE","DOI":"10.1109\/EISIC.2013.29"},{"key":"1628_CR2","unstructured":"Asghar MZ, Ahmad S, Marwat A and Kundi FM (2015) Sentiment analysis on Youtube: a brief survey. ArXiv Preprint http:\/\/arxiv.org\/abs\/1511.09142."},{"issue":"8","key":"1628_CR3","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1145\/2699410","volume":"58","author":"PS Bayerl","year":"2015","unstructured":"Bayerl PS, Akhgar B (2015) Surveillance and falsification implications for open source intelligence investigations. Commun ACM 58(8):62\u201369","journal-title":"Commun ACM"},{"key":"1628_CR4","volume-title":"Is open source intelligence an ethical issue? In government secrecy","author":"H Bean","year":"2011","unstructured":"Bean H (2011) Is open source intelligence an ethical issue? In government secrecy. Emerald Group Publishing Limited"},{"key":"1628_CR5","unstructured":"Beel J and Gipp B (2009) Google scholar\u2019s ranking algorithm: an introductory overview. In: Proceedings of the 12th International Conference on Scientometrics and Informetrics (ISSI\u201909), 1:230\u2013241. Rio de Janeiro (Brazil)"},{"key":"1628_CR6","doi-asserted-by":"crossref","unstructured":"Belghith Y, Venkatagiri S and Luther K (2022) Compete, collaborate, investigate: exploring the social structures of open source intelligence investigations. In: CHI Conference on Human Factors in Computing Systems, 1\u201318","DOI":"10.1145\/3491102.3517526"},{"key":"1628_CR7","doi-asserted-by":"crossref","unstructured":"Breton M, Lavigne V, Djaffri M and Dionnea M (2021) Military dataset processing approaches or trauma risk mitigation in machine learning practitioners.","DOI":"10.46713\/jdst.004.01"},{"issue":"3","key":"1628_CR8","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1016\/j.clsr.2017.03.002","volume":"33","author":"D Broeders","year":"2017","unstructured":"Broeders D, Schrijvers E, van der Sloot B, Van Brakel R, de Hoog J, Ballin EH (2017) Big data and security policies: towards a framework for regulating the phases of analytics and use of big data. Comput Law Secur Rev 33(3):309\u2013323","journal-title":"Comput Law Secur Rev"},{"issue":"1","key":"1628_CR9","doi-asserted-by":"publisher","first-page":"205395171562251","DOI":"10.1177\/2053951715622512","volume":"3","author":"J Burrell","year":"2016","unstructured":"Burrell J (2016) How the machine \u201cthinks\u201d: understanding opacity in machine learning algorithms. Big Data Soc 3(1):2053951715622512","journal-title":"Big Data Soc"},{"issue":"1","key":"1628_CR10","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/s13347-014-0170-y","volume":"28","author":"P Casanovas","year":"2015","unstructured":"Casanovas P (2015) Semantic web regulatory models: why ethics matter. Philosophy & Technology 28(1):33\u201355","journal-title":"Philosophy & Technology"},{"key":"1628_CR11","unstructured":"Casanovas P, Irujo JA, Melero F, Gonz\u00e1lez-Conejero J, Molcho G and Cuadros M (2014) Fighting organized crime through open source intelligence: regulatory strategies of the CAPER project. In: JURIX, 189\u2013198"},{"key":"1628_CR12","volume-title":"Dark web: exploring and data mining the dark side of the web","author":"H Chen","year":"2011","unstructured":"Chen H (2011) Dark web: exploring and data mining the dark side of the web, vol 30. Springer Science & Business Media"},{"key":"1628_CR13","doi-asserted-by":"crossref","unstructured":"Colesky, M, Hoepman J-H and Hillen C (2016) A critical analysis of privacy design strategies. In: 2016 IEEE Security and Privacy Workshops (SPW), 33\u201340. IEEE","DOI":"10.1109\/SPW.2016.23"},{"issue":"6","key":"1628_CR14","doi-asserted-by":"publisher","first-page":"642","DOI":"10.1016\/j.clsr.2013.09.002","volume":"29","author":"C Cuijpers","year":"2013","unstructured":"Cuijpers C (2013) Legal aspects of open source intelligence\u2014results of the VIRTUOSO project. Comput Law Secur Rev 29(6):642\u2013653. https:\/\/doi.org\/10.1016\/j.clsr.2013.09.002","journal-title":"Comput Law Secur Rev"},{"key":"1628_CR15","doi-asserted-by":"crossref","unstructured":"Daniels D (2016) Exploring the correlation between information security behavior and the awareness of open-source intelligence","DOI":"10.1016\/S1353-4858(16)30024-1"},{"key":"1628_CR16","first-page":"9760","volume":"33","author":"I Davidson","year":"2019","unstructured":"Davidson I, Walker PB (2019) Towards fluid machine intelligence: Can we make a gifted AI? Proc AAAI Conf Artif Intell 33:9760\u20139764","journal-title":"Proc AAAI Conf Artif Intell"},{"key":"1628_CR17","unstructured":"Defense Technical Information Center (DTIC) - Department of Defense (2013) Joint publication 2\u20130\u2014joint intelligence. https:\/\/web.archive.org\/web\/20160613010839\/; http:\/\/www.dtic.mil\/doctrine\/new_pubs\/jp2_0.pdf."},{"key":"1628_CR18","doi-asserted-by":"crossref","unstructured":"Dupont GM, de Chalendar G, Khelif K, Voitsekhovitch D, Canet G and Brunessaux S (2011) Evaluation with the VIRTUOSO platform: an open source platform for information extraction and retrieval evaluation. In Proceedings of the 2011 workshop on data infrastructures for supporting information retrieval evaluation, 13\u201318","DOI":"10.1145\/2064227.2064254"},{"key":"1628_CR19","doi-asserted-by":"crossref","unstructured":"Dwork C, Hardt M, Pitassi T, Reingold O and Zemel R (2012) Fairness through awareness. In: Proceedings of the 3rd innovations in theoretical computer science conference, 214\u2013226","DOI":"10.1145\/2090236.2090255"},{"key":"1628_CR20","first-page":"285","volume":"23","author":"Q Eijkman","year":"2012","unstructured":"Eijkman Q, Weggemans D (2012) Open source intelligence and privacy dilemmas: is it time to reassess state accountability. Sec Hum Rts 23:285","journal-title":"Sec Hum Rts"},{"issue":"3","key":"1628_CR21","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1080\/02684527.2017.1406677","volume":"33","author":"C Eldridge","year":"2018","unstructured":"Eldridge C, Hobbs C, Moran M (2018) Fusing algorithms and analysts: open-source intelligence in the age of \u201cBig Data.\u201d Intell Natl Secur 33(3):391\u2013406","journal-title":"Intell Natl Secur"},{"issue":"3","key":"1628_CR22","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1080\/19361610.2020.1761737","volume":"16","author":"JR Evangelista","year":"2021","unstructured":"Evangelista JR, Gon\u00e7alves RJ, Sassi MR, Napolitano D (2021) Systematic literature review to investigate the application of open source intelligence (OSINT) with artificial intelligence. J Appl Secur Res 16(3):345\u2013369. https:\/\/doi.org\/10.1080\/19361610.2020.1761737","journal-title":"J Appl Secur Res"},{"key":"1628_CR23","unstructured":"GDPR (2016) Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing directive 95\/46\/EC (General Data Protection Regulation). Official Journal L 119\/1"},{"issue":"5","key":"1628_CR24","doi-asserted-by":"publisher","first-page":"675","DOI":"10.1177\/0959354313495471","volume":"23","author":"M Glassman","year":"2013","unstructured":"Glassman M (2013) Open source theory. 01. Theory Psychol 23(5):675\u2013692","journal-title":"Theory Psychol"},{"issue":"2","key":"1628_CR25","doi-asserted-by":"publisher","first-page":"673","DOI":"10.1016\/j.chb.2011.11.014","volume":"28","author":"M Glassman","year":"2012","unstructured":"Glassman M, Kang MJ (2012) Intelligence in the internet age: the emergence and evolution of open source intelligence (OSINT). Comput Hum Behav 28(2):673\u2013682. https:\/\/doi.org\/10.1016\/j.chb.2011.11.014","journal-title":"Comput Hum Behav"},{"issue":"2","key":"1628_CR26","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1111\/j.1471-1842.2009.00848.x","volume":"26","author":"MJ Grant","year":"2009","unstructured":"Grant MJ, Booth A (2009) A typology of reviews: an analysis of 14 review types and associated methodologies. Health Info Libr J 26(2):91\u2013108","journal-title":"Health Info Libr J"},{"key":"1628_CR27","volume-title":"Publish or Perish","author":"A-W Harzing","year":"1997","unstructured":"Harzing A-W (1997) Publish or Perish. Tarma Software Research Pty Limited"},{"key":"1628_CR28","first-page":"107","volume":"26","author":"JL Horn","year":"1967","unstructured":"Horn JL, Cattell RB (1967) Age differences in fluid and crystallized intelligence. Acta Physiol (Oxf) 26:107\u2013129","journal-title":"Acta Physiol (Oxf)"},{"key":"1628_CR29","unstructured":"Hu E (2016) Responsible data concerns with open source intelligence. Responsible Data (blog). 14 Nov 2016. https:\/\/responsibledata.io\/2016\/11\/14\/responsible-data-open-source-intelligence\/"},{"issue":"4","key":"1628_CR30","first-page":"565","volume":"15","author":"AS Hulnick","year":"2002","unstructured":"Hulnick AS (2002) The downside of open source intelligence. Int J Intell Counter Intell 15(4):565\u2013579","journal-title":"Int J Intell Counter Intell"},{"issue":"2","key":"1628_CR31","first-page":"253","volume":"3","author":"P Hustinx","year":"2010","unstructured":"Hustinx P (2010) Privacy by design: delivering the promises. Identity Inf Soc 3(2):253\u2013255","journal-title":"Identity Inf Soc"},{"key":"1628_CR32","unstructured":"Ish D, Ettinger J and Ferris C (2021) Evaluating the effectiveness of artificial intelligence systems in intelligence analysis. RAND Corporation. https:\/\/www.rand.org\/pubs\/research_reports\/RRA464-1.html"},{"key":"1628_CR33","first-page":"250","volume":"113","author":"A Koenig","year":"2019","unstructured":"Koenig A (2019) \u201cHalf the truth is often a great lie\u201d: deep fakes, open source information, and international criminal law. Am J Int Law 113:250\u2013255","journal-title":"Am J Int Law"},{"issue":"6","key":"1628_CR34","doi-asserted-by":"publisher","first-page":"654","DOI":"10.1016\/j.clsr.2013.09.004","volume":"29","author":"B-J Koops","year":"2013","unstructured":"Koops B-J (2013) Police investigations in internet open sources: procedural-law issues. Comput Law Secur Rev 29(6):654\u2013665","journal-title":"Comput Law Secur Rev"},{"issue":"1","key":"1628_CR35","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1080\/17579961.2021.1898299","volume":"13","author":"B-J Koops","year":"2021","unstructured":"Koops B-J (2021) The concept of function creep. Law Innov Technol 13(1):29\u201356","journal-title":"Law Innov Technol"},{"issue":"6","key":"1628_CR36","doi-asserted-by":"publisher","first-page":"676","DOI":"10.1016\/j.clsr.2013.09.005","volume":"29","author":"B-J Koops","year":"2013","unstructured":"Koops B-J, Hoepman J-H, Leenes R (2013) Open-source intelligence and privacy by design. Comput Law Secur Rev 29(6):676\u2013688","journal-title":"Comput Law Secur Rev"},{"issue":"1","key":"1628_CR37","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1145\/1929887.1929902","volume":"2","author":"I Lee","year":"2011","unstructured":"Lee I, Martin F, Denner J, Coulter B, Allan W, Erickson J, Malyn-Smith J, Werner L (2011) Computational thinking for youth in practice. Acm Inroads 2(1):32\u201337","journal-title":"Acm Inroads"},{"key":"1628_CR38","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2019.113132","volume":"129","author":"MG Lozano","year":"2020","unstructured":"Lozano MG, Brynielsson J, Franke U, Rosell M, Tj\u00f6rnhammar E, Varga S, Vlassov V (2020) Veracity assessment of online data. Decis Support Syst 129:113132","journal-title":"Decis Support Syst"},{"key":"1628_CR39","doi-asserted-by":"crossref","unstructured":"Lozano MG, Franke U, Rosell M and Vlassov V (2015) Towards automatic veracity assessment of open source information. In: 2015 IEEE International Congress on Big Data, 199\u2013206. IEEE","DOI":"10.1109\/BigDataCongress.2015.36"},{"key":"1628_CR40","first-page":"99","volume":"23","author":"S Lu","year":"2020","unstructured":"Lu S (2020) Algorithmic opacity, private accountability, and corporate social disclosure in the age of artificial intelligence. Vand J Ent Tech l 23:99","journal-title":"Vand J Ent Tech l"},{"key":"1628_CR41","doi-asserted-by":"crossref","unstructured":"Lyle A (2016) Legal considerations for using open source intelligence in the context of cybercrime and cyberterrorism. In: Open source intelligence investigation, 277\u201394. Springer","DOI":"10.1007\/978-3-319-47671-1_17"},{"key":"1628_CR42","doi-asserted-by":"publisher","DOI":"10.1016\/j.intell.2021.101548","volume":"87","author":"HLJ Maas","year":"2021","unstructured":"Maas HLJ, Snoek L, Stevenson CE (2021) How much intelligence is there in artificial intelligence? A 2020 update. Intelligence 87:101548","journal-title":"Intelligence"},{"issue":"2","key":"1628_CR43","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1109\/5254.920602","volume":"16","author":"A Maedche","year":"2001","unstructured":"Maedche A, Staab S (2001) Ontology learning for the semantic web. IEEE Intell Syst 16(2):72\u201379","journal-title":"IEEE Intell Syst"},{"key":"1628_CR44","doi-asserted-by":"crossref","unstructured":"Manzoor SI and Singla J (2019) Fake news detection using machine learning approaches: a systematic review. In: 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI), 230\u201334. IEEE","DOI":"10.1109\/ICOEI.2019.8862770"},{"issue":"1","key":"1628_CR45","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1093\/jicj\/mqab006","volume":"19","author":"Y McDermott","year":"2021","unstructured":"McDermott Y, Koenig A, Murray D (2021) Open source information\u2019s blind spot: human and machine bias in international criminal investigations. J Int Crim Justice 19(1):85\u2013105","journal-title":"J Int Crim Justice"},{"key":"1628_CR46","doi-asserted-by":"crossref","unstructured":"McKeown S, Maxwell D, Azzopardi L and Glisson WB (2014) Investigating people: a qualitative analysis of the search behaviours of open-source intelligence analysts. In: Proceedings of the 5th Information Interaction in Context Symposium, 175\u2013184","DOI":"10.1145\/2637002.2637023"},{"key":"1628_CR47","first-page":"33","volume":"11","author":"SC Mercado","year":"2001","unstructured":"Mercado SC (2001) Fbis against the axis, 1941\u20131945. Stud Intell 11:33\u201343","journal-title":"Stud Intell"},{"issue":"4","key":"1628_CR48","doi-asserted-by":"publisher","first-page":"702","DOI":"10.1080\/08850607.2018.1492826","volume":"31","author":"BH Miller","year":"2018","unstructured":"Miller BH (2018) Open source intelligence (OSINT): an oxymoron? Int J Intell CounterIntell 31(4):702\u2013719","journal-title":"Int J Intell CounterIntell"},{"key":"1628_CR49","doi-asserted-by":"crossref","unstructured":"Neri F, Aliprandi C, Capeci F, Cuadros M and By T (2012) Sentiment analysis on social media. In: 2012 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining, 919\u2013926. IEEE","DOI":"10.1109\/ASONAM.2012.164"},{"key":"1628_CR50","first-page":"119","volume":"79","author":"H Nissenbaum","year":"2004","unstructured":"Nissenbaum H (2004) Privacy as contextual integrity. Wash l Rev 79:119","journal-title":"Wash l Rev"},{"issue":"3","key":"1628_CR51","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1080\/02684520802121216","volume":"23","author":"WE Odom","year":"2008","unstructured":"Odom WE (2008) Intelligence analysis. Intell Natl Secur 23(3):316\u2013332","journal-title":"Intell Natl Secur"},{"key":"1628_CR52","unstructured":"Olaru G and \u015etefan T (2018) Fake news-a challenge for OSINT. In: International Conference RCIC"},{"key":"1628_CR53","doi-asserted-by":"crossref","unstructured":"Ortiz-Arroyo D (2015) Decision support in open source intelligence. In: Intelligent methods for cyber warfare, 115\u201327. Springer.","DOI":"10.1007\/978-3-319-08624-8_5"},{"key":"1628_CR54","unstructured":"Parry J (2017) Open source intelligence as critical pedagogy; or, the humanities classroom as digital human rights lab. Interdisciplinary Humanities."},{"key":"1628_CR55","doi-asserted-by":"publisher","DOI":"10.4159\/harvard.9780674736061","volume-title":"The black box society: the secret algorithms that control money and information","author":"F Pasquale","year":"2015","unstructured":"Pasquale F (2015) The black box society: the secret algorithms that control money and information. Harvard University Press"},{"key":"1628_CR56","doi-asserted-by":"publisher","first-page":"10282","DOI":"10.1109\/ACCESS.2020.2965257","volume":"8","author":"J Pastor-Galindo","year":"2020","unstructured":"Pastor-Galindo J, Nespoli P, M\u00e1rmol FG, P\u00e9rez GM (2020) The not yet exploited goldmine of OSINT: opportunities, open challenges and future trends. IEEE Access 8:10282\u201310304","journal-title":"IEEE Access"},{"key":"1628_CR57","doi-asserted-by":"crossref","unstructured":"Paudyal P, and William Wong BL (2018) Algorithmic opacity: making algorithmic processes transparent through abstraction hierarchy. In: Proceedings of the Human Factors and Ergonomics Society Annual Meeting, 62:192\u2013196. SAGE Publications Sage CA: Los Angeles, CA","DOI":"10.1177\/1541931218621046"},{"key":"1628_CR58","unstructured":"Public Law 109\u2013163 (2006) National defense authorization act"},{"key":"1628_CR59","unstructured":"Rahman Z and Ivens G (2020) Ethics in open source investigations. In: Digital witness: using open source information for human rights investigation, documentation, and accountability 249\u2013270"},{"key":"1628_CR60","doi-asserted-by":"crossref","unstructured":"Sampson F (2016) Following the breadcrumbs: using open source intelligence as evidence in criminal proceedings. In: Open Source Intelligence Investigation, 295\u2013304. Springer","DOI":"10.1007\/978-3-319-47671-1_18"},{"issue":"1","key":"1628_CR61","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1177\/0032258X16671031","volume":"90","author":"F Sampson","year":"2017","unstructured":"Sampson F (2017) Intelligent evidence: using open source intelligence (OSINT) in criminal proceedings. The Police Journal 90(1):55\u201369","journal-title":"The Police Journal"},{"key":"1628_CR62","doi-asserted-by":"crossref","unstructured":"Schilling M, Ritter H and Ohl FW (2019) From crystallized adaptivity to fluid adaptivity in deep reinforcement learning\u2014insights from biological systems on adaptive flexibility. In: 2019 IEEE International Conference on Systems, Man and Cybernetics (SMC), 1472\u20131478. IEEE","DOI":"10.1109\/SMC.2019.8914302"},{"issue":"3","key":"1628_CR63","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1080\/23738871.2020.1832129","volume":"5","author":"A Shere","year":"2020","unstructured":"Shere A (2020a) Now you [don\u2019t] see me: how have new legislation and changing public awareness of the UK surveillance state impacted OSINT investigations? J Cyber Policy 5(3):429\u2013448","journal-title":"J Cyber Policy"},{"key":"1628_CR64","unstructured":"Shere A (2020b) Reading the investigators their rights: a review of literature on the general data protection regulation and open-source intelligence gathering and analysis. The New Collection 3"},{"key":"1628_CR65","volume-title":"The open-source everything manifesto: transparency, truth, and trust","author":"RD Steele","year":"2012","unstructured":"Steele RD (2012) The open-source everything manifesto: transparency, truth, and trust, vol 2. North Atlantic Books"},{"key":"1628_CR66","first-page":"1","volume":"12","author":"L Ten Hulsen","year":"2020","unstructured":"Ten Hulsen L (2020) Open sourcing evidence from the internet-the protection of privacy in civilian criminal investigations using OSINT (open-source intelligence). Amsterdam LF 12:1","journal-title":"Amsterdam LF"},{"issue":"4\u20135","key":"1628_CR67","doi-asserted-by":"publisher","first-page":"530","DOI":"10.1177\/1367549415577396","volume":"18","author":"D Trottier","year":"2015","unstructured":"Trottier D (2015) Open source intelligence, social media and law enforcement: visions, constraints and critiques. Eur J Cult Stud 18(4\u20135):530\u2013547","journal-title":"Eur J Cult Stud"},{"key":"1628_CR68","unstructured":"Unver A (2018) Digital open source intelligence and international security: a primer. EDAM Research Reports, Cyber Governance and Digital Democracy 8."},{"key":"1628_CR69","doi-asserted-by":"crossref","unstructured":"Wells D (2016) Taking stock of subjective narratives surrounding modern OSINT. In: Open source intelligence investigation, 57\u201365. Springer","DOI":"10.1007\/978-3-319-47671-1_5"},{"key":"1628_CR70","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-7091-0388-3","volume-title":"Counterterrorism and open source intelligence","author":"UK Wiil","year":"2011","unstructured":"Wiil UK (2011) Counterterrorism and open source intelligence. Springer"},{"key":"1628_CR71","doi-asserted-by":"crossref","unstructured":"Williams HJ and Blum I (2018) Defining second generation open source intelligence (OSINT) for the defense enterprise. RAND Corporation. https:\/\/www.rand.org\/pubs\/research_reports\/RR1964.html","DOI":"10.7249\/RR1964"},{"key":"1628_CR72","volume-title":"Smart governance: governing the global knowledge society","author":"H Willke","year":"2007","unstructured":"Willke H (2007) Smart governance: governing the global knowledge society. Campus Verlag"},{"key":"1628_CR73","unstructured":"Young JA, Campbell KN, Fanti AN, Alicea A, Weiss MV, Burkhart JR and Braasch MR (2018) The development of an open source intelligence gathering exercise for teaching information security & privacy"},{"issue":"6","key":"1628_CR74","doi-asserted-by":"publisher","first-page":"540","DOI":"10.1038\/embor.2009.115","volume":"10","author":"H Zwart","year":"2009","unstructured":"Zwart H, Nelis A (2009) What is ELSA genomics? EMBO Rep 10(6):540\u2013544","journal-title":"EMBO Rep"}],"container-title":["AI &amp; SOCIETY"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00146-023-01628-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00146-023-01628-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00146-023-01628-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,13]],"date-time":"2024-08-13T06:06:20Z","timestamp":1723529180000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00146-023-01628-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,28]]},"references-count":74,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,8]]}},"alternative-id":["1628"],"URL":"https:\/\/doi.org\/10.1007\/s00146-023-01628-x","relation":{},"ISSN":["0951-5666","1435-5655"],"issn-type":[{"value":"0951-5666","type":"print"},{"value":"1435-5655","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,1,28]]},"assertion":[{"value":"10 August 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 January 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 January 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no conflicts of interest to declare that are relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}